Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3663: Out-of-Bounds Read in xlnt-community xlnt

0
Medium
VulnerabilityCVE-2026-3663cvecve-2026-3663
Published: Sat Mar 07 2026 (03/07/2026, 14:32:09 UTC)
Source: CVE Database V5
Vendor/Project: xlnt-community
Product: xlnt

Description

A vulnerability was found in xlnt-community xlnt up to 1.6.1. This issue affects the function xlnt::detail::compound_document_istreambuf::xsgetn of the file source/detail/cryptography/compound_document.cpp of the component XLSX File Parser. Performing a manipulation results in out-of-bounds read. The attack is only possible with local access. The exploit has been made public and could be used. The patch is named 147. It is recommended to apply a patch to fix this issue.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/14/2026, 19:21:16 UTC

Technical Analysis

CVE-2026-3663 identifies an out-of-bounds read vulnerability in the xlnt-community xlnt library, versions 1.6.0 and 1.6.1, which is an open-source C++ library used for reading and writing XLSX spreadsheet files. The vulnerability resides in the function xlnt::detail::compound_document_istreambuf::xsgetn, located in the compound_document.cpp file within the cryptography-related compound document parsing code. This function is responsible for reading data streams from compound document structures, which are part of the XLSX file format internals. Due to improper bounds checking, an attacker with local access and low privileges can manipulate input to cause the function to read memory outside the allocated buffer, leading to an out-of-bounds read condition. This can result in exposure of sensitive memory contents or cause application crashes due to invalid memory access. The attack vector requires local access and low privileges but does not require user interaction or elevated privileges. The vulnerability has been publicly disclosed, and a patch (identified as patch 147) has been released to fix the issue by correcting the bounds checking logic. The CVSS 4.0 base score is 4.8, indicating a medium severity level with limited impact on confidentiality and availability, and no impact on integrity. No known exploits are currently active in the wild, but the public disclosure increases the risk of exploitation attempts. The vulnerability affects applications and systems that embed or use xlnt for XLSX file parsing, particularly those processing untrusted XLSX files locally.

Potential Impact

The primary impact of CVE-2026-3663 is the potential exposure of sensitive information through out-of-bounds memory reads when parsing malicious XLSX files using the vulnerable xlnt library versions. This can lead to leakage of memory contents that may include sensitive data, credentials, or internal application state. Additionally, the out-of-bounds read may cause application instability or crashes, potentially resulting in denial of service conditions. Since exploitation requires local access with low privileges, remote attackers cannot directly exploit this vulnerability without first gaining local access, limiting its scope. However, in multi-user environments or shared systems where untrusted XLSX files are processed locally, this vulnerability could be leveraged by malicious users to escalate information disclosure risks. Organizations relying on xlnt for XLSX file handling in desktop applications, automated processing pipelines, or embedded systems may face confidentiality risks and operational disruptions if unpatched. The absence of known exploits in the wild reduces immediate risk, but public availability of the exploit code increases the likelihood of future attacks.

Mitigation Recommendations

To mitigate CVE-2026-3663, organizations should promptly apply the official patch (patch 147) provided by the xlnt-community that corrects the out-of-bounds read issue in the compound_document_istreambuf::xsgetn function. If patching is not immediately feasible, consider the following additional measures: restrict local access to systems processing XLSX files with xlnt to trusted users only; implement strict file validation and sandboxing for XLSX files before processing to prevent malicious inputs; monitor and audit local user activities related to XLSX file handling; and update all dependent software components that embed xlnt to their latest secure versions. Developers integrating xlnt should review their usage patterns to ensure no untrusted XLSX files are processed without proper validation. Employing memory safety tools or runtime protections such as AddressSanitizer during development and testing can help detect similar issues proactively. Finally, maintain awareness of vendor advisories and subscribe to security mailing lists for timely updates.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-06T20:34:39.952Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69ac3a2fc48b3f10ffa2e9fa

Added to database: 3/7/2026, 2:46:07 PM

Last enriched: 3/14/2026, 7:21:16 PM

Last updated: 4/20/2026, 11:20:03 PM

Views: 45

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses